Wicked Botnet Uses Passel of Exploits to Target IoT
The code is integrated with at least three exploits that target unpatched IoT...
EUD Security Guidance: Windows 10 with Mobile Device Management
About this guidance This ALPHA guidance describes how to securely manage Windows 10 Desktop...
GDPR Security Outcomes
This guidance describes a set of technical security outcomes that are considered to...
Cisco Warns of Three Critical Bugs in Digital Network Architecture Platform
The company urges customers to patch three vulnerabilities that received the highest severity...
One Year After WannaCry: A Fundamentally Changed Threat Landscape
Threatpost talked to several security researchers about what's changed in the past year....
Critical Linux Flaw Opens the Door to Full Root Access
The vulnerability allows an attacker to execute a malware or other payloads on...
Phishing, spear phishing and whaling; does it change the price of phish?
The NCSC - in collaboration with CPNI - has recently published guidance on avoiding...
Avoid scoring a cyber security own goal this summer
This blog signposts to existing advice put together to answer any general...
Increased Cyber Threats: Security steps to take
This guidance outlines the security steps that your organisation should take in response...
Attackers Use UPnP to Sidestep DDoS Defenses
Universal Plug and Play networking protocols can be exploited to bypass DDoS mitigations....
Spray you, spray me: defending against password spraying attacks
One common way that online accounts are breached is through password spraying, whereby lists...
GDPR Phishing Scam Targets Apple Accounts, Financial Data
A phishing scam fooled victims by claiming to be Apple and scooping up...
Bugs in Logitech Harmony Hub Put Connected IoT Devices at ‘High Risk’
Researchers found an array of vulnerabilities in the Logitech Harmony Hub, shedding light...
Secrets of the Wiper: Inside the World’s Most Destructive Malware
The actors behind this kind of code, whether they’re bent on sending a...
Generic application development guidance
This guidance provides advice on how to minimise the loss of data from...
Apple iOS application development guidance
This guidance contains recommendations for the secure development, procurement and deployment of iOS applications. Please familiarise yourself with the generic application...
Google Project Zero Calls Windows 10 Edge Defense ‘ACG’ Flawed
Researchers maintain Microsoft’s vaunted Arbitrary Code Guard in the Edge browser can’t stop...
Application development collection
This guidance provides advice on how to minimise the loss of data from...
Android application development guidance
This guidance contains recommendations for the secure development, procurement and deployment of Android applications. Please familiarise yourself with the generic application...
Major OS Players Misinterpret Intel Docs, and Now Kernels Can Be Hijacked
Apple, Microsoft, Red Hat and others have built an uncannily similar privilege escalation...
Windows application developer guidance
This guidance contains recommendations for the secure development, procurement and deployment of Windows applications. Please familiarise yourself with the generic application...
The NCSC’s guide to developing, procuring and deploying applications
We've just updated our Application development guidance. In addition to the existing Android and...
“Equi-Facts”: Equifax Clarifies the Numbers for Its Massive Breach
As companies continue to install the vulnerable version of Apache Struts behind the...
FBI: Cyber-Fraud Losses Rise to Reach $1.4B
Tech-support scams took off during the year, while whaling/business email compromise was the...
Lenovo Patches Arbitrary Code Execution Flaw
Lenovo warns of a high-severity bug impacting its System x line of servers,...
EUD Security Guidance: macOS 10.13 High Sierra
This guidance was developed following testing performed on MacBook Pro and MacBook Air...
Report: Intel Facing New Spectre-Like Security Flaws
Intel may be facing as many as eight new Spectre-level vulnerabilities in its...
CyberFirst Girls’ talent showcased as the 2018 competition comes to a close
One of the best things about working on the CyberFirst Girls Competition is seeing the...
Twitter Urges Users to Change Passwords Due to Glitch
A glitch caused Twitter passwords to be stored in plain text on an...
Critical Cisco WebEx Bug Allows Remote Code Execution
Attackers can leverage the flaw by convincing users to open a file purported...

